The SCEAS System
Navigation Menu

Search the dblp DataBase


Gregory Neven: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mihir Bellare, Gregory Neven
    Transitive Signatures Based on Factoring and RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:397-414 [Conf]
  2. Mihir Bellare, Gregory Neven
    Multi-signatures in the plain public-Key model and a general forking lemma. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:390-399 [Conf]
  3. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  4. Michel Abdalla, Chanathip Namprempre, Gregory Neven
    On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:262-279 [Conf]
  5. Mihir Bellare, Gregory Neven
    Identity-Based Multi-signatures from RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:145-162 [Conf]
  6. Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen
    Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP]
    DAIS, 2001, pp:217-228 [Conf]
  7. Mihir Bellare, Chanathip Namprempre, Gregory Neven
    Security Proofs for Identity-Based Identification and Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:268-286 [Conf]
  8. Klaus Kursawe, Gregory Neven, Pim Tuyls
    Private Policy Negotiation. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:81-95 [Conf]
  9. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  10. Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven
    Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:219-232 [Conf]
  11. Bart De Decker, Gregory Neven, Frank Piessens
    Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:337-348 [Conf]
  12. T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
    On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:183-198 [Conf]
  13. Gregory Neven, Frank Piessens, Bart De Decker
    On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:361-370 [Conf]
  14. Mihir Bellare, Gregory Neven
    Transitive signatures: new schemes and proofs. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:6, pp:2133-2151 [Journal]
  15. James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt
    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:274-292 [Conf]
  16. Elena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton
    Seven-Property-Preserving Iterated Hashing: ROX. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:130-146 [Conf]
  17. Michel Abdalla, Eike Kiltz, Gregory Neven
    Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:139-154 [Conf]
  18. Jan Camenisch, Gregory Neven, Abhi Shelat
    Simulatable Adaptive Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:573-590 [Conf]
  19. Mihir Bellare, Chanathip Namprempre, Gregory Neven
    Unrestricted Aggregate Signatures. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:411-422 [Conf]
  20. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]

  21. Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. [Citation Graph (, )][DBLP]

  22. Oblivious transfer with access control. [Citation Graph (, )][DBLP]

  23. Efficient Sequential Aggregate Signed Data. [Citation Graph (, )][DBLP]

  24. Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. [Citation Graph (, )][DBLP]

  25. A card requirements language enabling privacy-preserving access control. [Citation Graph (, )][DBLP]

  26. Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP]

  27. Robust Encryption. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002